Build your own DNS server on Linux
Learn how to use BIND to set up your own server for resolving domain names.
Regular Expressions #2: An example
In the previous article, Regular Expressions #1: Introduction, I covered what they are and why they’re useful.
The example in this article highlights the power and flexibility of the Linux command line, especially regular expressions, for their ability to automate common tasks.
Regular Expressions #1: Introduction
Regular expressions don’t have to invoke anxiety and fear, although they do for many of us. The function of regular expressions is to provide a highly flexible tool for matching strings of characters in a stream of data. When a match is found, the program’s action can be as simple as to pass the line of data in which it’s found on to STDOUT, or as copmplex as replacing that string with another.
How to upgrade your Fedora Linux system to the latest release with DNF system-upgrade
Article updated 05/20/2024.
Upgrading any operating system to a new release version can be time-consuming and fraught with problems. Fedora 40 was released very recently and I used these easy steps to upgrade all twelve of my home systems. It was easy and all went well.
Ansible #2 How to create an Ansible Playbook
In this introduction to Playbook creation, we examine a play that manages updates for a local Ansible controller machine.
NetworkManager on Linux: #3 — How I migrated to NetworkManager Connection Files for configuration
Interface configuration files may not be supported in Fedora much longer, but migrating to NetworkManager is easier than you might think.
An introduction to GRUB2 configuration for your Linux machine
Learn how the GRUB boot loader works to prepare your system and launch your operating system kernel.
NetworkManager on Linux: #2 — A sysadmin’s guide to network interface configuration files
Simplify the complex world of interface configuration files with this handy tutorial.
A Linux networking guide to CIDR notation and configuration
One of the key concepts in network routing that any Linux professional should be familiar with is network notation. CIDR stands for Classless-Inter Domain Routing; it defines a notation methodology for network addressing that is used to specify the network portion of an IP address.
NetworkManager on Linux: #1 — Getting Started
Most current Linux distributions use NetworkManager for creating and managing network connections. Learn what NetworkManager is and how to use it to view network connections and devices for Linux hosts.
An introduction to Linux network routing
Every computer attached to a network requires some type of routing instructions for network TCP/IP packets when they leave the local host. This is usually very straightforward because most network environments are very simple and there are only two options for departing packets.
But that’s not always the case. Learn how to create a router with your Linux computer.
Introduction to the Domain Name System (DNS)
Learn how the global DNS system makes it possible for us to assign memorable names to the worldwide network of machines we connect to every day.
Is Linux Really Secure?
On March 29 of 2024, a security vulnerability was reported against the XZ library as CVE-2024-3094. This vulnerability creates what is known as a backdoor — a known and easy means for CR4CK3R$ to access infected systems and use them for malicious purposes. Considering this, is Linux really more secure than Windows? Is it secure at all?
An introduction to the Linux boot and startup processes with GPT and GRUB2
Ever wondered what it takes to get your system ready to run applications? Here’s what is going on under the hood.
Using rsync for Backup
There are many options for performing backups. Most Linux distributions are provided with one or more open source programs especially designed to perform backups. There are many commercial options available as well. But none of those directly met my needs so I decided to use basic Linux tools to do the job.
Using tar and ssh for backups
Couples complement each other and each member of the couple contributes unique and irreplaceable parts to the whole. But some couples are very odd. Such is the case with this couple of commands – the tar and ssh commands.